Preview

Security Policy for Antivirus, Spyware, and Adware

Powerful Essays
Open Document
Open Document
1030 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Policy for Antivirus, Spyware, and Adware
Security Policy for Antivirus, Spyware, and Adware

Anti-Virus Policy:
Purpose and Scope * To provide a network environment that is virus-free. * To establish base requirements that must be met by computers connected to the network to ensure effective virus detection and prevention. * This policy applies to all computers that are connected to the network via a physical network connection, a wireless connection, a connection through the modem pool, or a VPN connection. * This policy covers computers that are company owned and computers that are owned by individuals and are attached to the network. This policy covers all types of computers including, but not limited to, desktop computers, laptop computers, server class computers, smart phones, and tablets. * This policy covers home computers that are owned and/or used by staff, and/or their families that connect to the network via the modem pool.
Policy
* All computers that are connected to the network must have the standard supported anti-virus software installed and scheduled to run at regular intervals. In addition, the anti-virus software and the virus definition files must be kept up-to-date. * All PC's are to be configured such that they schedule regular updates from the Network Services centralized anti-virus servers. * Manually disabling or shutting off anti-virus software is prohibited. * Any activities with the intention to create and/or distribute malicious programs into the network (e.g., viruses, worms, Trojan horses, e-mail bombs, malware, etc.) are prohibited. * Virus-infected computers are removed from the network until they are verified as virus-free. * Noted exceptions: Unix, Linux or Mac OS operating systems do not have supported anti-virus software supplied by the company, it is the responsibility of the owner/operator of the Unix, Linux, or Mac Os system to protect their system from viruses. * Contact the Help Desk for more information about

You May Also Find These Documents Helpful

  • Powerful Essays

    MGT2 Task3

    • 5037 Words
    • 21 Pages

    Identify and install the latest security software on all telecommuters' PCs and enforce strict rules for information access including password policy management.…

    • 5037 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Scope this policy applies to all Richman Investments employees, contractors, vendors and agents with a Richman Investments-owned or personally-owned computer or workstation used to connect to the Richman Investments network. This policy applies to remote access connections used to do work on behalf of Richman Investments, including reading or sending email and viewing intranet web resources. Remote access implementations that are covered by this policy include, but are not limited to: frame relay, DSL, ISDN, SSH, VPN, dial-in modems, and cable modems, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    7. Domain policy is a default policy for domain computers. Local policies are for your local computer. Domain policies will overwrite local policies.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has antivirus and malware protection installed on them. Laptops are very vulnerable for loss or theft, so all company laptops should have an encrypted hard drive so that if they are stolen, the data contained on them is not recovered by anyone but the owner.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 9 Assignment 1

    • 582 Words
    • 2 Pages

    - Ensure compliance requirements of this policy concerning data at rest and role-holders access to managed networks, systems and servers…

    • 582 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    IS 3350: Policy Report

    • 1146 Words
    • 5 Pages

    This policy applies to all student workers, staff, independent contractors, and volunteers (College, 2010). Anyone that will be in contact with PII documents, or finical records.…

    • 1146 Words
    • 5 Pages
    Better Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Why is it recommended to do an anti-virus signature file update before performing an anti-virus scan on…

    • 1020 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    This policy applies to all Corona District High School employees, contractors, vendors and agents with a Corona District High School-owned or personally-owned computer or workstation used to connect to the Corona District High School network. This policy applies to remote access connections used to do work on behalf of Corona District High School, including reading or sending email and viewing intranet web resources.…

    • 848 Words
    • 4 Pages
    Good Essays
  • Good Essays

    operations in organisations and business environments. Security threats on the remote machines can always be averted easily and their impacts are not as serious compared to threats on the central computer system (Kaufman et al, 2002).The central computer system is a valuable resource that must be secured to ensure continued operation in the organisation. Securing a central computer network is the key to ensuring network security in any institution (Kaeo, 1999).…

    • 349 Words
    • 2 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    homework 1

    • 454 Words
    • 2 Pages

    Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 454 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays